The document provides information about the NTC 362 Fundamentals of Networking course, including a study guide link, assignments for weeks 1 through 4, and quizzes covering various topics. Key topics covered include networking models, infrastructure, addressing, protocols, routing, subnets, VLANs, and performance/recovery. The document contains links to additional online course materials.
APM Welcome, APM North West Network Conference, Synergies Across Sectors
NTC 362 Fundamentals of Networking Study Guide
1. NTC/362
FUNDAMENTALS OF NETWORKING
The Latest Version A+ Study Guide
**********************************************
NTC 362 Entire Course Link
https://uopcourse.com/category/ntc-362/
**********************************************
NTC 362 Wk 1 - MindTap Unit 1 Quiz
Use the MindTap Access link to access this assignment.
Complete MindTap Unit 1 Quiz (Unit 1: Introduction > Unit 1 Apply > Unit 1 Quiz).
Which type of address is used at the Transport layer to identify the receiving application?
• Protocol
• IP address
• Port
• MAC address
You have a network that consists of seven computers running Windows 10 Professional. You add
an eighth computer with Windows Server 2016 installed. Which networking model can the
network now support that it could not support without the addition of the eighth computer?
• Star-bus
• Hybrid
• Client-server
• Ring
2. Which email protocol allows an email client to download email messages to the local computer?
• TCP
• POP3
• SMTP
• IMAP4
In the client-server model, what is the primary protocol used for communication between a
browser and web server?
• FTP
• TCP
• HTTP
• SSL
For More Classes Please Visit
https://uopcourse.com/
Anetwork consists of five computers, all running Windows 10 Professional. All the computers are
connected to a switch, which is connected to a router, which is connected to the Internet. Which
networking model does the network use?
• Hybrid
• Ring
• Star-bus
• Peer-to-peer
You have a network of ten computers connected to a single switch that has 12 ports. You need to
add six more computers to the network so you add a second switch by connecting it to the first
switch by way of a network cable. Which network topology is now used?
• Star-bus
• Mesh
• Hybrid
• Star
Which application embedded in Windows operating systems allows remote control of a computer
and uses the RDP secure protocol for transmissions?
• SSH
• SFTP
• Remote Desktop
• Telnet
3. Anetwork consists of seven computers and a network printer, all connected directly to one switch.
Which network topology does this network use?
• Mesh
• Star-bus
• Hybrid
• Star
Which two encryption protocols might be used to provide secure transmissions for browser and
web server communications?
• SSLand TLS
• TCP and UDP
• SSLand HTTP
• HTTP and HTTPS
Which email protocol allows an email client to read mail stored on the mail server?
• IMAP4
• TCP
• SMTP
• POP3
For More Classes Please Visit
https://uopcourse.com/
NTC 362 Wk 1 – MindTapUnit 12 Quiz
Use the MindTap Access link to access this assignment.
Complete the MindTap Unit 12 Quiz (Unit 12: Wide Area Networks > Unit 12 Apply > Unit
12 Quiz).
What specifications define the standards for cable broadband?
• DOCSIS
• ATM
• ANSI
• Digital signal
4. What kind of network is the PSTN?
• Dedicated line
• Packet-switched
• Virtual circuit
• Circuit-switched
What method does a GSM network use to separate data on a channel?
• CDMA
• TDMA
• SIM
• TDM
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
• Layer 2
• Layer 4
• Layer 3
• Layer 5
For More Classes Please Visit
https://uopcourse.com/
______________ in SONET are analogous to the ________________ of T-carriers.
• QoS levels, OC levels
• OC levels, digital signal levels
• OC levels, carrier levels
• Throughput, digital signal levels
How many channels are in an ISDN PRI connection?
• 23D+B
• 23B+D
• 2D+B
• 2B+D
Which DSL standard has the fastest speeds immediately outside the CO?
• ADSL
• VDSL
• SDSL
• ADSL2+
What kind of device can monitor a connection at the demarc but cannot interpret data?
• Smart jack
• NIU
• NID
5. • CSU/DSU
An organization can lease a private _________________ that is not shared with other users, or a
_________________ that can be physically configured over shared lines in the carrier's cloud.
• SVC (switched virtual circuit), dedicated line
• dedicated line, virtual circuit
• PVC (permanent virtual circuit), SVC (switched virtual circuit)
• SVC (switched virtual circuit), PVC (permanent virtual circuit)
Where does an MPLS label go in a PDU?
• Between Layers 1 and 2
• Between Layers 2 and 3
• Layer 1
• Layer 3
For More Classes Please Visit
https://uopcourse.com/
NTC 362 Wk 2 - MindTap Unit 2 Quiz
Use the MindTap Access link to access this assignment.
Complete MindTap Unit 2 Quiz (Unit 2: Network Infrastructure and Documentation > Unit
2 Apply > Unit 2 Quiz).
Which of the following devices are you likely to find in the MDF? Choose all that apply.
• Routers
• Switches
• Network printer
• KVM switch
Which device converts signals from a campus's analog phone equipment into IP data that can
travel over the Internet?
• VoIP endpoint
• VoIP PBX
• VoIP switch
• VoIP gateway
What type of diagram shows a graphical representation of a network's wired infrastructure?
• Wiring schematic
• Network map
6. • Rack diagram
• Network topology
A transceiver was recently damaged by a lightning strike during a storm. How might you decide
whether the ISP is responsible for replacing this device, or whether your company must foot the
bill?
• Look at the manufacturer information on the device's label.
• Look at purchase records for the device to determine when it was acquired.
• Look at what kinds of cables are connected to this device.
• Look at whether the device is located on the ISP's side of the demarc.
You need to connect a new network printer to a nearby wall jack. What kind of cable should you
use?
• Plenum-rated cable
• Backbone cable
• Patch cable
• Fiber-optic cable
You've decided to run an Nmap scan on your network. What app could you open to perform this
task? Choose all that apply.
• Zenmap
• Microsoft Edge
• Command Prompt
• PowerShell
For More Classes Please Visit
https://uopcourse.com/
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to
a rack?
• Large fans
• AC adapter
• Padded feet
• Rack ears
Atechnician from your ISP has arrived to help you troubleshoot a weak WAN connection. Towhat
location do you take her?
• Entrance facility
• IDF
• CEO's office
• Work area
What is the first step of inventory management?
7. • Back up network data.
• Interview users.
• List an administrative account's username and password for each device on a network.
• List all components on the network.
Which of these is considered a secure place to store a list of documented network passwords?
• The MDF
• Apassword manager
• Asticky note under the keyboard
• The CEO's smartphone
For More Classes Please Visit
https://uopcourse.com/
NTC 362 Wk 2 – MindTapUnit 5 Quiz
Use the MindTap Access link to access this assignment.
Complete MindTap Unit 5 Quiz (Unit 5: Network Cabling > Unit 5 Apply > Unit 5 Quiz).
What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?
• Twisted-pair cable, RJ-11
• Coaxial cable, F-connector
• Fiber-optic cable, MTRJ
• Copper cable, RJ-45
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a
wire pair?
• Toner
• Tone locator
• TDR
• Tone generator
Which fiber connector contains two strands of fiber in each ferrule?
• LC
• ST
• SC
• MTRJ
Which transmission characteristic is never fully achieved?
• Throughput
• Bit rate
8. • Latency
• Bandwidth
What is the earliest twisted-pair cabling standard that meets the minimum requirements for
10GBase-T transmissions?
• Cat 5e
• Cat 5
• Cat 7
• Cat 6a
Which kind of multiplexing assigns slots to nodes according to priority and need?
• TDM (time division multiplexing)
• CWDM (coarse wavelength division multiplexing)
• WDM (wavelength division multiplexing)
• STDM (statistical time division multiplexing)
What type of fiber cable problem is caused when pairing a 50-micron core cable with a
62.5-micron core cable?
• Tx/Rx reverse
• Dirty connectors
• Wavelength mismatch
• Fiber type mismatch
For More Classes Please Visit
https://uopcourse.com/
Suppose you're creating patch cables to be used in a government office. What color wire goes in
the first pin?
• Blue
• White/green
• Brown
• White/orange
Which of these categories of twisted-pair cable can support Gigabit Ethernet?
• Cat 5, Cat 6, Cat 7
• Cat 5e, Cat 6a, Cat 7
• Cat 6, Cat 7a, Cat 5
• Cat 5e, Cat 6, Cat 3
Which kind of crosstalk occurs between wire pairs near the source of the signal?
• FEXT
• Alien
• NEXT
9. • Tx/Rx reverse
For More Classes Please Visit
https://uopcourse.com/
NTC 362 Wk 3 - MindTap Unit 3 Quiz
Use the MindTap Access link to access this assignment.
Complete the MindTap Unit 3 Quiz (Unit 3: Addressing on Networks > Unit 3 Apply > Unit
3 Quiz).
What decimal number corresponds to the binary number 11111111?
• 255
• 11,111,111
• 127
• 256
When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the
computer first configures for itself?
• 2001::/3
• FE80::/10
• FF00::/8
• 2001::/64
You have just brought online a new secondary DNS server and notice your network-monitoring
software reports a significant increase in network traffic. Which two hosts on your network are
likely to be causing the increased traffic and why?
• The root and primary DNS servers, because the primary server is requesting zone transfers
from the root server
• The web server and primary DNS server, because the web server is requesting zone
transfers from the primary DNS server
• The caching and primary DNS servers, because the caching server is requesting zone
transfers from the primary server
• The secondary and primary DNS servers, because the secondary server is requesting zone
transfers from the primary server
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4
network. To which device(s) are you transmitting?
• The one device that is configured with this IP address
• All devices on your local network
• No devices
• All devices on the Internet
10. Which computers are the highest authorities in the Domain Name System hierarchy?
• Primary DNS servers
• Authoritative name servers
• Top-level domain servers
• Root servers
If you are connected to a network that uses DHCP, and you need to terminate your Windows
workstation's DHCP lease, which command would you use?
• ipconfig /release
• ifconfig /renew
• ipconfig /renew
• ifconfig /release
What type of device does a computer turn to first when attempting to make contact with a host
with a known IP address on another network?
• Root server
• Default gateway
• DHCP server
• DNS server
For More Classes Please Visit
https://uopcourse.com/
Which type of DNS record identifies an email server?
• PTR record
• MX record
• AAAA record
• CNAME record
Which of these commands is available only in Linux?
• ipconfig
• nslookup
• dig
• ping
Which part of a MAC address is unique to each manufacturer?
• The physical address
• The device identifier
• The OUI
• The network identifier
11. NTC 362 Wk 4 - MindTap Lab 4-1: Routing Concepts and
Protocols
Use the MindTap Access link to access this assignment.
Complete MindTap Lab 4-1: Routing Concepts and Protocols (Unit 4: Network Protocols
and Routing > Unit 4 Live Virtual Machine Labs > Lab 4-1: Routing Concepts and
Protocols).
For More Classes Please Visit
https://uopcourse.com/
NTC 362 Wk 4 - MindTap Unit 4 Quiz
Use the MindTap Access link to access this assignment.
Complete the MindTap Unit 4 Quiz (Unit 4: Network Protocols and Routing > Unit 4
Apply > Unit 4 Quiz).
Which OSI layer is responsible for directing data from one LAN to another?
• Physical layer
• Network layer
• Transport layer
• Data Link layer
At which OSI layer does IP operate?
• Transport layer
• Application layer
• Data Link layer
• Network layer
What kind of route is created when a network administrator configures a router to use a specific
path between nodes?
• Best path
• Trace route
• Default route
• Static route
12. Which two protocols manage neighbor discovery processes on IPv4 networks?
• BGP and OSPF
• IPv4 and IPv6
• ICMP and ARP
• TCP and UDP
Which routing protocol does an exterior router use to collect data to build its routing tables?
• OSPF
• IP
• RIPv2
• BGP
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data
unit sent by the source?
• Checksum
• DiffServ
• Acknowledgment number
• Source port
A routing protocol's reliability and priority are rated by what measurement?
• AD
• Routing table
• MTU
• Latency
For More Classes Please Visit
https://uopcourse.com/
When a router can't determine a path to a message's destination, where does it send the message?
• Gateway of last resort
• Default gateway
• Administrative distance
• Routing table
Which protocol's header would a Layer 4 device read and process?
• HTTP
• ARP
• TCP
• IP
What is the Internet standard MTU?
• 65,535 bytes
• 1,522 bytes
13. • 1,500 bytes
• 9,198 bytes
For More Classes Please Visit
https://uopcourse.com/
NTC 362 Wk 4 MindTap Unit8 Quiz
Use the MindTap Access link to access this assignment.
Complete the MindTap Unit 8 Quiz (Unit 8: Subnets and VLANs > Unit 8 Apply > Unit 8
Quiz).
Which formulas can be used to calculate the magic number? Choose two.
• 256 - the interesting octet
• 2h - 2
• 2n
• 2h
How many bits of a Class A IP address are used for host information?
• 8 bits
• 32 bits
• 24 bits
• 16 bits
Which IEEE standard determines how VLANs work on a network?
• 802.11
• 802.1Q
• 802.3af
• 802.1x
Which port mode on a switch enables that port to manage traffic for multiple VLANs?
• Ethernet
• Console
• Trunk
• Access
What is the formula for determining the number of possible hosts on a network?
• 2h = Z
• 2n =Y
• 2h - 2 = Z
14. • 2n - 2 = Y
Which of the following is not a good reason to segment a network?
• To narrow down the location of problems on a network
• To increase the number of networking devices on a network
• To reduce the demand on bandwidth
• To limit access to broadcast domains
What do well-chosen subnets accomplish?
• Routing efficiency is decreased by ensuring IP address spaces are not mathematically
related.
• IP address spaces overlap for easier management.
• Network documentation is easier to manage.
• Problems affect the entire network, making them more difficult to pin down.
Which hexadecimal block in an IPv6 address is used for the Subnet ID?
• The first one
• The fourth one
• The third one
• The eighth one
What is the least number of bits you would need to borrow from the network portion of a Class B
subnet mask to get at least 130 hosts per subnet?
• Eight
• Ten
• Nine
• None
While designing your network's VLAN topology, your team has decided to use a centrally
managed DHCP server rather than creating a separate DHCP server for each VLAN. What
software will you need to make the central DHCP server accessible across VLANs?
• Hypervisor
• DHCP relay agent
• Virtual router
• DHCP server
For More Classes Please Visit
https://uopcourse.com/
NTC 362 Wk 4 MindTap Unit11 Quiz
Use the MindTap Access link to access this assignment.
15. Complete the MindTap Unit 11 Quiz (Unit 11: Network Performance and
Recovery > Unit 11 Apply > Unit 11 Quiz).
When shopping for a new router, what does the MTBF tell you?
• How long devices like this one will last on average until the next failure
• How much it will cost to repair that device
• How long until that device fails
• How long it will usually take to repair that device
While troubleshooting a recurring problem on your network, you will want to examine the TCP
messages being exchanged between a server and a client. Which tool should you use?
• Spiceworks
• Wireshark
• VirtualBox
• Packet Tracer
One of your coworkers downloaded several, very large video files for a special project she's
working on for a new client. When you run your network monitor later this afternoon, what list
will your coworker's computer likely show up on?
• Top listeners
• Jabbers
• Giants
• Top talkers
Which power backup method will continually provide power to a server if the power goes out
during a thunderstorm?
• Online UPS
• Dual power supplies
• Generator
• Standby UPS
What port do SNMP agents listen on?
• Port 162
• Port 161
• Port 21
• Port 20
Your roommate has been hogging the bandwidth on your router lately. What feature should you
configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
• Port mirroring
• Power management
• Port forwarding
• Traffic shaping
16. What command requests the next record in an SNMP log?
• SNMP Get Response
• SNMP Get Next
• SNMP Get Request
• SNMP Trap
Which of the following features of a network connection between a switch and server is not
improved by link aggregation?
• Bandwidth
• Speed
• Availability
• Fault tolerance
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing
traffic?
• Traffic Class
• Priority Code Point
• Time to Live
• DiffServ
Which type of disaster recovery site contains all the equipment you would need to get up and
running again after a disaster, and yet would require several weeks to implement?
• Cold site
• Standby site
• Warm site
• Hot site
For More Classes Please Visit
https://uopcourse.com/
NTC 362 Wk 5 - MindTap Lab 10-1: Implementa Host-based
Firewall
Use the MindTap Access link to access this assignment.
Complete MindTap Lab 10-1: Implement a Host-based Firewall (Unit 10: Security in
Network Design > Unit 10 Live Virtual Machine Labs > Lab 10-1: Implement a Host-based
Firewall).
17. For More Classes Please Visit
https://uopcourse.com/
NTC 362 Wk 5 – MindTapUnit 10 Quiz
Use the MindTap Access link to access this assignment.
Complete the MindTap Unit 10 Quiz (Unit 10: Security in Network Design > Unit 10
Apply > Unit 10 Quiz).
What kind of firewall blocks traffic based on application data contained within the packets?
• Stateless firewall
• Host-based firewall
• Packet-filtering firewall
• Content-filtering firewall
What feature of Windows Server allows for agentless authentication?
• Network-based firewall
• IDS (intrusion detection system)
• ACL (access control list)
• AD (Active Directory)
Which of the following features is common to both an NGFW and traditional firewalls?
• Application Control
• IDS and/or IPS
• User authentication
• User awareness
Which NGFW feature allows a network admin to restrict traffic generated by a specific game?
• Application awareness
• User awareness
• Context awareness
• Content filter
Which command on an Arista switch would require an SNMP notification when too many devices
try to connect to a port?
• mac-limit
• storm-control
• shutdown
• switchport port-security
18. At what layer of the OSI model do proxy servers operate?
• Layer 3
• Layer 2
• Layer 7
• Layer 4
What software might be installed on a device to authenticate it to the network?
• Operating system
• NAC (network access control)
• Security policy
• Agent
Active Directory and 389 Directory Server are both compatible with which directory access
protocol?
• Kerberos
• AES
• LDAP
• RADIUS
Which of the following is not one of the three AAA services provided by RADIUS and
TACACS+?
• Authentication
• Authorization
• Accounting
• Access control
Which of the following ACL commands would permit web-browsing traffic from any IP address
to any IP address?
• access-list acl_2 permit http any any
• access-list acl_2 permit icmp any any
• access-list acl_2 deny tcp host 2.2.2.2 host 3.3.3.3 eq www
• access-list acl_2 deny tcp any any
For More Classes Please Visit
https://uopcourse.com/
NTC 362 Wk 5 - SignatureAssignment: Network Security
Analysis
19. For this assignment, you will demonstrate your understanding of foundational network
security concepts, some of which you implemented in this week’s hands-on assignment.
Download and complete the Week Five Network Security Assignment.
Cite any sources you include using APA format.
Submit your completed assignment.
For More Classes Please Visit
https://uopcourse.com/
NTC/362 Wk 5 – Network Security Assignment
You are in networking at a large international company. Your company recently decided to
implement a cross-training initiative, and you have been selected to give a presentation to an
audience of non-networking professionals working at various departments in your company. Your
presentation must be clear and concise enough to convey technical information to professionals
who have a limited understanding of how networking actually works. However, it must also be
accurate enough that your audience can understand how their company roles (such as scheduling
resource-hogging reports, allowing contractors access to the system, and setting the hours
international customers can place orders on your company’s system) can impact the company’s
network, particularly in terms of security.
You decide to answer the following questions before handing off the material to an assistant to
turn into a graphic-rich presentation. Each of your answers should be about 150 to 250 words
long.
Note: Your assignment is just to answer the following questions. You will not create a presentation
for this assignment.
1. You decide tobeginyourpresentationbyprovidingyouraudience anoverview of
networking,withanemphasisonsecurityandwhyitisimportantfor all companyroles
to assistinsecuringthe company’snetwork.Youdecide touse the OSImodel toexplain
the fundamental characteristicsandcomponentsof networksbecause itisvisual and
presentsthe complexityof networkcommunicationinjust7steps.
Include a discussion of each of the following in your response, being sure to emphasize the
point(s) in the seven-layer OSI model where security is an issue, and listing specific security
risks associated with each pain point:
Distributedvs.centralizedcomputersystemsandwhyyourdepartmentchose tobe
distributed/centralized
Differentnetworktopologiesandwhyyourdepartmentchose the topologyitdid
Why standardsbodiesare essential innetworkingandhow yourdepartment
complieswithstandards
20. The importance of communicationprotocolsandwhichone(s)yourdepartment
chose
The differencesbetweenLAN,WAN,andwirelesstechnologies,andhow your
departmentincorporatedeach
The responsibilitiesassociatedwithprovidingtelecommunicationsservicessuchas
security,privacy,reliability,andperformance
2. Next,youplanto describe basicroutingandswitchinginthe contextof the OSImodel
(i.e.,inwhichlayerrouting,switching,andcablingoccur).Tounderscore your
department’scommitmenttoachieving24/7 availability,youdescribe somestrategies
your departmentfollowstoensure the availabilityof networkaccessinswitchedand
routednetworks.
3. Then,youdescribe atleastthree characteristicsof aneffective securitypolicy,
emphasizingthe waysinwhichall departmentsinthe companyare responsiblefor
helpingsecure the companynetwork.
4. To reassure youraudience of yournetwork’ssecurity,youlistsome strategiesyour
departmentusedtobuild securitydirectlyintothe designof yourcompanynetwork.
5. Finally,malware hasbeeninthe newsalotlately,andyouknow youwill be askedsome
questionsaboutit.Toanswerthem, youcome up witha layperson-friendlydefinitionof
malware andidentifyatleasttwostrategiesyourdepartmenthasputintoplace for
protectingyourcompany’snetworkagainstmalware.
For More Classes Please Visit
https://uopcourse.com/